doo-soon Park

doo-soon Park
Soonchunhyang University · Department of Computer Software Engineering

Doctor of Engineering

About

113
Publications
12,750
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
766
Citations
Citations since 2016
51 Research Items
545 Citations
2016201720182019202020212022020406080100120
2016201720182019202020212022020406080100120
2016201720182019202020212022020406080100120
2016201720182019202020212022020406080100120
Additional affiliations
September 1985 - present
Soonchunhyang University
Position
  • Professor (Full)

Publications

Publications (113)
Article
Full-text available
Due to the coronavirus disease 2019 (COVID-19) outbreak, there is an urgent need to research the spread of disease and prevention strategies. As the spread of COVID-19 is closely related to the structure of human social networks, there are a lot of existing works that use a topological structure to analyze the characteristics of spread. Several stu...
Article
Full-text available
A third place (public social space) has been proven to be a gathering place for communities of friends on social networks (social media). The regulars at places of worship, cafes, parks, and entertainment can also possibly be friends with those who follow each other on social media, with other non-regulars being social network friends of one of the...
Chapter
Full-text available
Considerable attention has recently been devoted to Knowledge Graph (KG), which has been applied in many domains. However, the information is often imprecise and vague when constructing the knowledge graph and thus the Fuzzy Knowledge Graph (FKG) emerged. Considering the increasing data in FKG, this paper firstly formulates the entity summarization...
Chapter
Full-text available
The current research trends many researchers apply the community detection method in the graph generated from the social network to create various real-world applications. The different result of used this method given the high performance and high accuracy, especially in the field of prediction the information which matches the information of the...
Chapter
Full-text available
Formal Concept Analysis (FCA) methodology, as an efficient knowledge representation and knowledge discovery tool and has been widely used in various fields, such as data mining, expert systems, and others. Knowledge reduction is an essential issue for knowledge discovery. This paper focuses on attribute reduction in FCA and explores the internal re...
Article
Full-text available
The concept stability measure under the Formal Concept Analysis (FCA) theory is useful for improving the accuracy of structure identification of social networks. Nevertheless, the stability calculation is an NP-complete task which is the primary challenges in practical. Most existing studies have focused on the approximate estimate to calculate the...
Article
Full-text available
The development of mobile edge computing (MEC) is accelerating the popularity of 5G applications. In the 5G era, aiming to reduce energy consumption and latency, most applications or services are conducted on both edge cloud servers and cloud servers. However, the existing multi-cloud composition recommendation approaches are studied in the context...
Article
Full-text available
The increasing social problems on population, resources and environment enable the interaction between nature and humanity to become one of the most active research fields in the world. In this paper, we propose a novel framework of human–land sustainable computational system, which fully advances the progress of the development of our society util...
Article
Full-text available
IT technology and traditional industries have been combined recently, resulting in IT convergence technology in various fields. Through convergence with the automobile, pedestrian detection technology, in particular, is used in the autonomous navigation control service of autonomous vehicles and also applied in various fields such as intelligent CC...
Article
Full-text available
This article investigates the efficiency of a doParallel algorithm and a formal concept analysis (FCA) network graph applied to recommendation systems. It is the first article using the FCA method to create a network graph and apply this graph to improve the accuracy of a recommendation system. According to the fundamental knowledge about users who...
Article
Full-text available
With advanced development of Internet communication and ubiquitous computing, Social Networks are providing an important information channel for smart city construction. Therefore, analyzing Location-based Social Network is a very valuable work in achieving reasonable urban zoning. In Social Networks, a main purpose of prestige assessment is to ext...
Chapter
Full-text available
Many types of research have been conducted in recommendation system to develop approaches to solve the challenges for collaborative filtering problem such as cold start problem; in this paper, we proposed the approach to solving the problem of collaborative by using social network analysis and k-nearest neighbor (k-NN). We used the centrality of so...
Chapter
In Message Oriented Middleware are composed of semiautonomous, heterogeneous, and independently designed next generation framework. For described to achieve successful operation of such a system, the activities of the message controlling the subsystems have to be coordinated. In addition, each layer applications can require synchronizes on events r...
Chapter
Crowdphotographing, an emerging self-service mode over the mobile Internet, is to recruit several users to take the pictures via incentive mechanism. Importantly, it can be used for business inspection and information collection for enterprises. This paper mainly studies the rationality and optimization of task pricing for crowdphotographing. In th...
Chapter
Full-text available
Various recommender systems have been presented in an effort to get better preciseness. In order to further improve more accuracy, the k-clique methodology, which is used to analyze social networks was introduced in the recommendation system and the result shows the k-clique method is effective in improving accuracy. In this paper, we propose a rec...
Book
This book presents the combined proceedings of the 10th International Conference on Computer Science and its Applications (CSA 2018) and the 13th KIPS International Conference on Ubiquitous Information Technologies and Applications (CUTE 2018), both held in Kuala Lumpur, Malaysia, Dec 17 - 19, 2018. The aim of these two meetings was to promote disc...
Article
Full-text available
The advancement of mobile Internet and ubiquitous computing is facilitating various crowdsourcing services in which individuals or organizations obtain goods and services with less time and monetary cost. Recently, crowdphotographing, an emerging self-service mode over the mobile Internet, is to recruit several users to take the pictures via incent...
Article
Full-text available
The last few decades have witnessed a steady increase in medicine prescriptions for the treatment of biometric markers rather than obvious physiological symptoms; especially, the over-the-counter (OTC) medicine experiences rated by patients have huge potential to assist people to make more appropriate decisions. The most existing researches focus o...
Article
Full-text available
Formal concept analysis has been witnessed to be an effective soft computing methodology for data analysis, rule extraction and clustering, but how to build a formal concept lattice efficiently is always a challenge issue. Recent years, several deformation formal contexts are emerging for addressing current important research problems, such as virt...
Article
Full-text available
Compressed Sensing (CS), as a promising paradigm for acquiring signals, is playing an increasing important role in many real-world applications. One of the major components of CS is sparse signal recovery in which greedy algorithm is well-known for its speed and performance. Unfortunately, in many classic greedy algorithms, such as OMP and CoSaMP,...
Chapter
Full-text available
Social communities’ detection in large social networks is playing an effective role for analyzing users’ behavior and activities over the social media. K-clique community, as one of important topological structure for social networking analysis, provides an efficient coarse knowledge granularity for understanding the structure of the social network...
Article
Full-text available
The amount of movie has increased to become more congested; therefore, to find a movie what users are looking for through the existing technologies are very hard. For this reason, the users want a system that can suggest the movie requirement to them and the best technology about these is the recommendation system. However, the most recommendation...
Article
Full-text available
In this paper, we propose a method to detect network intrusions using anomaly detection technique based on probabilistic analysis. Victim’s computers under attack show various symptoms such as degradation of TCP throughput, increase in CPU usage, increased round trip time, frequent disconnection to the Web sites, etc. These symptoms can be used as...
Article
Mobile edge computing (MEC) is providing a promising solution for augmenting the computing and storage capacity of mobile devices by exploiting the available resources at the network edge. Among the various Internet of Things (IoT) applications, MEC could help us to narrow the gap between the requirements of IoT applications and the limited resourc...
Article
Full-text available
Mobile Internet and Cloud Computing technologies facilitate the rapid development of mobile cloud services. Particularly, mobile cloud services recommendation has become increasingly important as services become increasingly prevalent over the Internet. Existing recommendation mechanisms mainly focus on Quality of Services (QoS). However, the conti...
Article
Full-text available
The booming and novel emerging promising technologies on ubiquitous computing, GPS positioning, are facilitating the development of location-based services (LBSs). Particularly, understanding the dynamic topological structures of mobile users in LBSs who visit the same physical locations has many meaningful applications including friend recommendat...
Article
Full-text available
Gait is not only one of the most important functions and activities in daily life but is also a parameter to monitor one‘s health status. We propose a single channel capacitive proximity pressure sensor (TCPS) and gait monitoring system for smart healthcare. Insole-type TCPS (270 mm in length) was designed consisting of three layers including two s...
Article
Full-text available
As vehicular networking has recently been developed and commercialized, vehicular cloud computing has received much attention in various research areas, such as intelligent transportation systems and vehicular ad hoc networks. An efficient intersection traffic control using vehicular cloud computing is one of the key research topics in intelligent...
Article
Full-text available
In analysis of ubiquitous networks, one critical work is to understand the internal structure of the networks. Many approaches are proposed to address the structure mining in the graph. Unfortunately, these approaches cannot cope with the big graph generated by large-scale streaming data. Aiming to mine the structure from the big graph, this paper...
Article
Full-text available
The characteristics of the massive social media data, diverse mobile sensing devices as well as the highly complex and dynamic user’s social behavioral patterns have led to the generation of huge amounts of high dimension, uncertain, imprecision and noisy data from social networks. Thanks to the emerging soft computing techniques which unlike the c...
Article
Full-text available
Complex networking analysis is a powerful technique for understanding both complex networks and big graphs in ubiquitous computing. Particularly, there are several novel metrics, such as k-clique and k-core are proposed in order to study the relative importance of nodes in complex networks. Among of those metrics, k-core analysis is an effective ap...
Article
Full-text available
In social networking analysis, there exists a fundamental problem called maximal cliques enumeration(MCE), which has been extensively investigated in many fields, including social networks, biological science, etc. As a matter of fact, the formation principle of maximal cliques that can help us to speed up the detection of maximal cliques from soci...
Conference Paper
Maximal Cliques Enumeration (MCE), as a fundamental problem, has been extensively investigated in many fields, such as social networks, and biological science and so forth. However, the existing research works usually ignore the formation principle of maximal cliques which can help us to speed up the detection of maximal cliques in a graph. This pa...
Article
This paper investigates the Iceberg Clique (IC) queries in a large graph, specially, given a user-specified threshold θ, an IC query reports the cliques where the number of vertices exceeds ⌊θ|V|⌋. Towards this end, a practical IC query theorem is formally proposed and proved. With this proposed query theorem, a formal context and its corresponding...
Chapter
Full-text available
In this paper, we provide a detection technology for a common type of network intrusion (traffic flood attack) using an anomaly data detection method based on probabilistic model analysis. Victim's computers under attack show various symptoms such as degradation of TCP throughput, increase of CPU usage, increase of RTT (Round Trip Time), frequent d...
Article
Full-text available
Many real-world applications information are organized and represented with graph structure which is often used for representing various ubiquitous networks, such as World Wide Web, social networks, and proteinprotein interactive networks. In particular, similarity evaluation between graphs is a challenging issue in many fields such as graph search...
Article
Graph, an important information organizational structure, is commonly used for representing the social networks, web, and other internet applications. This paper tackles a fundamental problem on measuring similarity between graphs that is the essential step for graph searching, matching, pattern discovery. To efficiently measure the similarity betw...
Article
Full-text available
Complex Networks, an important representation method for information organization, have been penetrated into various applications, such as biological science, social networks, as well as the web networks. Currently, the critical research on Complex Networks focuses on representation, characterization of topological structures. To understand the int...
Article
Virtual Reality (VR) techniques advances the development of research on virtual plants which is regarded as one of the most important parts of Digital Agriculture. At present, there exists a gap that the existing simulation techniques of virtual plants cannot achieve the purpose of real-time drawing by virtue of cloud computing according to capture...
Chapter
Nowadays, mobile users are rapidly increased and many mobile environments are proposed by the improvement of wireless devices and network. There are many mobility management protocols are proposed to provide seamless mobile network environment. In this paper, we focused on transportation environment that is one of bus, train, airplane or ship that...
Article
Full-text available
Identifying the dense subgraphs from large graphs is important and useful to various social media mining applications. Most of existing works focus on the densest subgraph problem in the unweighted and undirected represented social network which can maximize the average degree over all possible subgraphs. However, considering the frequent signed re...
Article
The depletion of natural resources in the last century now threatens our planet and the life of future generations. For the sake of sustainable development, this paper pioneers an interesting and practical problem of dense substructure (i.e., maximal cliques) mining in a fuzzy graph where the edges are weighted by the degree of membership. For para...
Chapter
The dramatic explosion of huge number of heterogeneous medical data in smart healthcare, is leading to many difficulties on both obtaining the intelligence, cognition and natural interactions between doctors and patients. Toward to this end, this paper proposed a big medical data cognitive system with the proposed methodology that is n-ary formal c...
Article
With the rapid development of both ubiquitous computing and the mobile internet, big data technology is gradually penetrating into various applications, such as smart traffic, smart city, and smart medical. In particular, smart medical, which is one core part of a smart city, is changing the medical structure. Specifically, it is improving treatmen...
Article
Full-text available
The explosive growth of information has been difficult for users to get an appropriate information in time. The various ways of new services to solve problems has been provided. As customized service is being magnified, the personalized recommendation system has been important issue. Collaborative filtering system in the recommendation system is wi...
Article
Full-text available
With the advent of ubiquitous sensing and networking, future social networks turn into cyber-physical interactions, which are attached with associated social attributes. Therefore, social network analysis is advancing the interconnections among cyber, physical, and social spaces. Community detection is an important issue in social network analysis....
Article
Full-text available
In recent years, mobile and ubiquitous computing has emerged in our daily lives, and extensive studies have been conducted in various areas using smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, in order to realize this computing technology. Especially, the integration of mobile networking techno...
Article
Full-text available
In order to prevent drug abuse or misuse cases and avoid over-prescriptions, it is necessary for medicine taker to be provided with detailed information about the medicine. In this paper, we propose a drug information system and develop an application to provide information through drug image recognition using a smartphone. We designed a contents-b...
Article
Full-text available
Numerous studies are currently being carried out on personalized services based on data analysis to find and provide valuable information about information overload. Furthermore, the number of studies on data analysis of teaching-learning activities for personalized services in the field of teaching-learning is increasing, too. This paper proposes...
Chapter
Electropulsegraphy is a medical device that was invented by an orient medical physician and a few engineers to help the physicians to diagnose patients in more systematic way by analyzing waves generated from the device. With the use of the device, doctors can diagnose patients based on charts rather than by feeling purses manually as in traditiona...
Chapter
The advancement of Smart Medical enriches the treatment plans for various diseases. However, how to launch an efficient treatment plan for reducing the pollution, lowering side-effect as well as the treatment cost is becoming a challenge. To cope with this challenge and evaluate the treatment plans during the whole life cycle of it, this paper firs...
Book
This book presents the combined proceedings of the 7th International Conference on Computer Science and its Applications (CSA-15) and the International Conference on Ubiquitous Information Technologies and Applications (CUTE 2015), both held in Cebu, Philippines, December 15 - 17, 2015. The aim of these two meetings was to promote discussion and in...
Article
The growth of wireless networks and the increasing popularity of mobile devices present an significant opportunity to empower them as a payment device. Unfortunately, several problems hinder the widespread acceptance of mobile payments, for example, privacy protection and user anonymity. Measures to ensure anonymity in payment systems must be consi...
Article
Full-text available
In recent years, various research fields, such as Information Technology (IT), Nano Technology (NT), Bio Technology (BT), Culture Technology (CT), Space Technology (ST), and Environment Technology (ET), have fused to solve a large number of issues in the real world. In particular, service solutions have emerged by combining IT and BT in the area of...
Article
The Desktop Grid Systems (DGSs) have supported a resource-providing environment for large-scale applications, utilizing the idle CPU cycle of the desktop computers connected over the Internet. Moreover, a variety of large-scale applications, such as an analysis of genome sequence in biotechnology, climate prediction in meteorology, etc., has been s...
Article
Virtual screening is the process of reducing an unmanageable number of compounds to a limited number of compounds by means of docking. It is one of the large-scale scientific applications that require large computing power and data storage capability. Grid computing focuses on large-scale resource sharing, innovative applications and high-performan...